Computer Forensics - Lesson 02
Computer Forensics - Lesson 02
Course outline
Digital Evidence (EA)
Requirements for digital evidence Admissibility of electronic evidence Preparing for collection of digital evidence Forensic examination of computers and digital electronic media
Records
Through every step of the procedure, it is crucial to record and document everything that is done and everything that is used.
This ensures that the procedure is repeatable.
Records
What to record:
Who initially reported the suspected incident along with the time, date, and circumstances surrounding the suspected incident. Details of initial assessment leading to the formal investigation. Name of all persons conducting the investigation.
Records
More of what to record:
The case number of the incident. Reasons for the investigation. A list of all computer systems included in the investigation, along with complete system specifications. Network diagrams. Applications running on the computer systems previously listed.
Records
More of what to record:
A copy of the policy or policies that relate to accessing and using the systems previously listed. A list of administrators responsible for the routine maintenance of the system. A detailed list of steps used in collecting and analyzing evidence. An access control list of who had access to the collected evidence at what date and time.
Evidence Collection
Steps:
Find the evidence Find the relevant data Create an order of volatility Remove external avenues of change Collect the evidence Document everything
Evidence Collection
Find the evidence:
Determine where the evidence you are looking for is stored. Use a checklist to double check that everything you are looking for is there.
Evidence Collection
Find the relevant data:
Once youve found the data, you need to figure out what part of it is relevant to the case. In general you should err on the side of overcollection.
Evidence Collection
Create an order of volatility:
Now that you know exactly what to gather, work out the best order in which to gather it. Ensures that you minimize loss of uncorrupted evidence.
Evidence Collection
Remove external avenues of change:
It is essential that you avoid alterations to the original data. Preventing anyone from tampering with the evidence helps you to create as exact an image as possible.
Evidence Collection
Collect the evidence:
Collect the evidence using the appropriate tools for the job. As you go, re-evaluate the evidence youve already collected. You may find that you missed something important.
Evidence Collection
Document everything:
Your collection procedures may be questioned later, so it is important that you document everything that you do.
With the right tools it is very easy to determine if digital evidence has been modified or tampered with by comparing it with the original.
When criminals attempt to destroy digital evidence, copies can remain in places they were not aware of.
When there is plenty of time and uncertainty about what is being sought, but a computer is suspected to contain key evidence, it makes sense to copy the entire contents.
Note the tool used When making the bit stream image, note and document how the image was created. Also note the date, time, and the examiner